Cloudflare for Teams enables you to restrict access to your applications to devices running the Cloudflare WARP client. This allows you to flexibly ensure that a user's traffic is secure and encrypted before allowing access to a resource protected behind Teams.
The process involves two steps:
- Setting up Require WARP as a device posture check.
- Adding the check to new or existing to enforce the check for one or more of your applications.
Set up a device posture check
You are now ready to start requiring WARP for your Access applications.
Add the check to a Zero Trust policy
On the Teams dashboard, navigate to Access > Applications.
Locate the application for which you want to require WARP.
To have an existing policy require WARP, click Edit for that specific policy. Then, add an Include or Require rule with the option WARP selected.
Click Save rule.
Before granting access to the application, your policy will now check that the user is running the WARP client on their machine.